Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 29.517
Word version: 18.6.0
1…
4…
5…
5.6…
A…
5.6
Data Model
5.6.1
General
5.6.2
Structured data types
5.6.3
Simple data types and enumerations
5.7
Error handling
5.7.1
General
5.7.2
Protocol Errors
5.7.3
Application Errors
5.8
Feature negotiation
5.9
Security
5.6
Data Model
p. 28
5.6.1
General
p. 28
5.6.2
Structured data types
p. 32
5.6.2.1
Introduction
p. 32
5.6.2.2
Type AfEventExposureSubsc
p. 32
5.6.2.3
Type AfEventExposureNotif
p. 33
5.6.2.4
Type EventsSubs
p. 33
5.6.2.5
Type EventFilter
p. 34
5.6.2.6
Type AfEventNotification
p. 36
5.6.2.7
Type ServiceExperienceInfoPerApp
p. 38
5.6.2.8
Type ServiceExperienceInfoPerFlow
p. 39
5.6.2.9
Type SvcExperience
p. 39
5.6.2.10
Type UeMobilityCollection
p. 39
5.6.2.11
Type UeCommunicationCollection
p. 40
5.6.2.12
Type UeTrajectoryCollection
p. 40
5.6.2.13
Type CommunicationCollection
p. 40
5.6.2.14
Type ExceptionInfo
p. 41
5.6.2.15
Type UserDataCongestionCollection
|R17|
p. 41
5.6.2.16
Type PerformanceDataCollection
|R17|
p. 41
5.6.2.17
Type PerformanceData
|R17|
p. 42
5.6.2.18
Type AddrFqdn
|R17|
p. 42
5.6.2.19
Type CollectiveBehaviourFilter
|R17|
p. 43
5.6.2.20
Type CollectiveBehaviourInfo
|R17|
p. 44
5.6.2.21
Type DispersionCollection
|R17|
p. 45
5.6.2.22
Type PerUeAttribute
|R17|
p. 45
5.6.2.23
Type MsQoeMetricsCollection
|R17|
p. 45
5.6.2.24
Type MsConsumptionCollection
|R17|
p. 46
5.6.2.25
Type MsNetAssInvocationCollection
|R17|
p. 46
5.6.2.26
Type MsDynPolicyInvocationCollection
|R17|
p. 46
5.6.2.27
Type MSAccessActivityCollection
|R17|
p. 46
5.6.2.28
Type DatVolTransTimeCollection
|R18|
p. 47
5.6.3
Simple data types and enumerations
p. 47
5.6.3.1
Introduction
p. 47
5.6.3.2
Simple data types
p. 47
5.6.3.3
Enumeration: AfEvent
p. 47
5.6.3.4
Enumeration: CollectiveBehaviourFilterType
|R17|
p. 48
5.6.3.6
Enumeration: RelativeDirection
|R18|
p. 49
5.7
Error handling
p. 49
5.7.1
General
p. 49
5.7.2
Protocol Errors
p. 49
5.7.3
Application Errors
p. 49
5.8
Feature negotiation
p. 49
5.9
Security
p. 51